BACKGROUNDThe present embodiments relate to increasing the security associated with deliverable items, packages, and/or products, and more particularly to enhancing the security associated with deliverable mail.
The physical delivery of items, products, and/or packages, e.g. physical mail, by courier, including private and/or public postal or courier services is associated-inherently-with security vulnerabilities. For example, mail left in a mail box can be stolen, and sensitive information intended for the recipient can be appropriated by a third party with malicious intent.
Accordingly, there is a need to improve the security associated with the delivery of items, products, and/or packages.
SUMMARYOne aspect of the present disclosure includes a compute implemented method for encoding, decoding and/or facilitating physical delivery of a message. The method can include: identifying a recipient for transmission of a message from a sender, encrypting, utilizing at least one device associated with the sender, two or more portions of a sender message, each of the two or more portions of the sender message corresponding to a distinct scannable encryption mechanism located on a physical medium, where the physical medium contains an unencrypted message portion, and where the encryption is based at least in part on an identity information of a recipient, transmitting at least one decryption mechanism to a device associated with the recipient, where the decryption mechanism is based at least in part on the identity information of the recipient, and where the decryption mechanism is configured to decrypt the two or more encrypted portions of the sender message, transmitting the physical medium to the recipient, scanning, using the device associated with the recipient, each of the scannable encryption mechanisms, decrypting, based on the scanning and using the at least one decryption mechanism at the device associated with the recipient, each of the two or more portions of the sender message, sending a first confirmation message to the at least one device associated with the sender once a decryption of one of the two or more portions of the sender message is complete, and sending a second confirmation message to the at least one device associated with the sender once a decryption of another one of the two or more portions of the sender message is complete.
Another aspect of the present disclosure includes an apparatus configured to encode, decode and/or facilitate physical delivery of a message. The apparatus includes: a processor circuit, and a memory storing instructions which when executed by the processor circuit, cause the processor circuit to: transmit to a device of a recipient at least one decryption mechanism, where the at least one decryption mechanism is based at least in part on an identity information of the recipient, and where the at least one decryption mechanism is configured to decrypt, based on a scanning operation at the device of the recipient, two or more distinct scannable encryption mechanisms associated with two or more portions of a sender message, and where each of the two or more scannable encryption mechanisms are located on a surface of a portion of a physical mailing associated with a postal service, and where the surface of the portion of the physical mailing has both the two or more scannable encryption mechanisms and an unencrypted message portion, receive a first confirmation message once the decryption of one of the two or more portions of the sender message is complete, and receive a second confirmation message once the decryption of another one of the two or more portions of the sender message is complete.
Yet another aspect of the present disclosure includes an article of manufacture. The article of manufacture can include: a container with a postage, a physical medium in the container, where the physical medium contains a sender message embodied on the surface of the physical medium, and where the sender message includes: an unencrypted message, and two or more encrypted portions of a plurality of terms of service, where each of the two or more encrypted portions of the plurality of terms of service are associated with a distinct barcode corresponding to each of the two or more encrypted portions, where the encryption is based at least in part on an identity information of a recipient, where the barcode is configured for scanning by a device associated with the recipient, and where each barcode is associated with a token configured for decrypting the two or more encrypted portions.
BRIEF DESCRIPTION OF THE DRAWINGSFIG. 1 illustrates an example of a system encrypting a physical delivery, decrypting a physical delivery, and/or delivering a physical delivery in accordance to at least one embodiment of the present disclosure.
FIG. 2 illustrates an examples of one or more processing flows for encryption, decryption, and/or delivering according to at least one embodiment of the present disclosure.
FIG. 3 illustrates an examples of one or more processing flows for encryption, decryption, and/or delivering according to at least one embodiment of the present disclosure.
FIG. 4 illustrates a machine learning system according to an embodiment of the present disclosure
FIG. 5 illustrates an embodiment of a computing architecture useful with at least one embodiment of the present disclosure.
FIG. 6 illustrates an embodiment of a communications architecture useful with at least one embodiment of the present disclosure.
DETAILED DESCRIPTIONVarious embodiments are generally directed to techniques, systems, and processing flows to improve the security of a delivered package, item, or product to a recipient, where the delivered package can be physical postal mail. In various embodiments, the physical mail can contain an unencrypted message identifier, e.g. the name of the recipient with a postage stamp, without any additional information conveyable in a manner discernible to the naked eye. One or more portions of an actual message to be read by the recipient is encoded using any suitable encoding technique, e.g. a barcode associated with an encryption token that is unique to the recipient (e.g. a recipient device, such as a mobile phone or other suitable computer device). A host system associated with a sender can transmit a decryption mechanism to the recipient's device, such that the recipient can decrypt the one or more encrypted message portions, e.g. by scanning each encrypted portion with a camera associated with user device (e.g. mobile phone camera), and thereafter ascertain the message contents.
In various embodiments, in addition to enhancing the security of the deliverable mail by requiring that the recipient decrypt it before being able to read it, once the message is successfully decrypted, the host system can receive a confirmation that the message has been received and read. This enhances the security of the overall system by providing an additional confirmation mechanism that the mail has not been misappropriated or lost. Moreover, in various embodiments, where the encrypted message is associated with a specific message or message portion, e.g. a terms of service or a portion of a terms of service that carries particular importance (e.g. pricing of a product of service to be provided by the entity associated with the host system), the confirmation can serve as an efficient and secure mechanism to establish (and record) that the user/recipient has accepted and/or has been informed of the message or message portion (e.g. terms of service or terms of service portion) at issue. As such, in various embodiments, in addition to enhancing the security associated with the delivery of the mail, various embodiments also provide a secure technical mechanism to determine, prove and/or record that a user has received a message of particular importance (e.g. a message whose delivery carries legal significance).
Reference is now made to the drawings, wherein like reference numerals are used to refer to like elements. In the following description, for the purpose of explanation, numerous specific details are set forth in order to provide a thorough understanding thereof. It may be evident, however, that the novel embodiments can be practiced without these specific details. In other instances, well-known structures and devices are shown in block diagram form to facilitate a description thereof. The intention is to cover all modification, equivalents, and alternatives within the scope of the claims.
FIG. 1 depicts a schematic of anexemplary system100, consistent with disclosed embodiments. As shown, thesystem100 includes one or moremobile devices110 that can interact with a user102 (or users102), and aserver120 via any suitable network130 (e.g. internet, intranet, or any other suitable network). Themobile devices110 are representative of any type of network-enabled computing devices, such as smartphones, tablet computers, wearable devices, laptops, portable gaming devices, and the like. Theserver120 is representative of any type of computing device, such as a server, workstation, computer cluster, cloud computing platform, virtualized computing system, and the like.
As shown, amemory111 of themobile device110 includes an instance of an operating system (OS)112 and aprocessor119 may execute one or more operations associated with the applications of the operating system (OS)112 and/or perform any other suitable operation associated with processor activity, including comparison operations and executing instructions associated withmemory111.Example operating systems112 include the Android® OS, iOS®, Linux®, and Windows® operating systems. As shown, theOS112 includes one or more applications, including an authentication or verification application or service114 (hereinafter referred to as “authentication application” for convenience), one or moreother applications115, one ormore access applications116, abarcode application117, and adecryption mechanism127.
Theauthentication application114 is generally configured to perform one or more operations related to authenticating auser102, including but not limited to determining when a user requires authentication for a transaction, service, or accessibility request, including the accessibility of information associated with a physically delivered item, package, or mailing (e.g. postal mail) and/or receiving credentials from one or more applications of a host device,e.g. server120, related to authenticating a user. For example, theauthentication application114 may receive anysuitable decryption mechanism127 from amanagement application123 of a server, where thedecryption mechanism127 can be related to anencryption mechanism125 and can facilitate a decryption operation associated with the encryption operation of the encryption mechanism, e.g. such as a token for decrypting a barcode in association with a scan thereof and/or a key to decipher ciphered text. In various embodiments, theencryption mechanism125 can be embodied in the form of one ormore barcodes144 associated with the one or more message segments of the contents of apostal mail142 and/or ciphered text (e.g. based on any suitable cryptographic technique) associated with the one more message segments of the contents of thepostal mail142, and theauthentication application114 can receive a single, multiple, or continuous stream ofdecryption mechanisms127 from theserver120 in order to decrypt the encryption associated with the encryption mechanism, e.g. theauthentication application114 can utilize a decryption token in relation with a scan of one ormore barcodes144 associated with one or more message segments and in association with a scan (e.g. facilitated by abarcode application117 instructing ascanner118 to scan a suitable barcode) of the same and/or a static or alternating cipher associated ciphered text. Once theauthentication application114 decrypts theencryption mechanism125 associated with the one or more message segments, then the content associated with those segments can be presented to theuser102 in discernible form (e.g. visually, audibly, or otherwise). In various embodiments, once decrypted, the one or more message contents are displayed to theuser102 via thedisplay140 associated withmobile device110.
In various embodiments, where the encryption/decryption scheme is a barcode, theauthentication application114 can instruct thebarcode application117 to facilitate thescanner118 for scanning the one ormore barcodes144. In various embodiments, upon scanning, theauthentication application114 can fetch thedecryption mechanism127 provided by theserver120, and if thedecryption mechanism127 is suitable in relation to the one ormore barcodes144, then one or more message segments of thepostal mail142 can be decoded and viewed by theuser102.
In various embodiments, theauthentication application114 can send a confirmation back to theserver120 indicating that the one or more message segments associated with thepostal mail142 have been reviewed by theuser102, e.g. once the decryption occurs the confirmation is sent. In various embodiments, theauthentication application114 can instruct thedisplay140 of themobile device110 to expressly request that auser102 confirm that he or she has read the one or more message segments by so indicating (using any suitable interface and/or command gesture with respect to mobile device110).
In various embodiments, theauthentication application114 can instruct the barcode application117 (e.g. via the scanner118) to scan the one ormore barcodes144 associated with one or more message segments and by, for example, coordinating with themanagement application123 of the server, theauthentication application114 can determine that at least one of the one ormore barcodes144 corresponds to material that must be reviewed and confirmed as read by theuser102 before additional material can be presented to the user. In various embodiments, more than one message segments associated with more than onebarcode144 can have to be reviewed in order for additional segments to be presented to theuser102, where each presentation may or may not require a separate barcode scan (and decoding and/or decrypting by the authentication application114) by thescanner118. For example, one or more message segments associated with one ormore barcodes144 can be part of a terms of service for a service, deliverable product, a purchase, or other suitable activity or engagement, and one or more of those one or more message segments can be critical portions of the terms of service, such as pricing term or legal liability terms. In various embodiments, e.g. by communicating with themanagement application123 or by other suitable local or non-local mechanisms, theauthentication application114 can require the user to accept one or more of those critical terms before being able to review the rest of the message segments (e.g. additional terms of service), and a confirmation of the acceptance of each one of those critical terms can be communicated to themanagement application123 by the authentication application.
In various embodiments, as shown and as alluded to above, thesystem100 can include a host device, e.g. such as aserver120, that can be used in accordance with at least embodiment of the present disclosure. Theserver120 can include amemory122 configurable to include and/or including one or more relevant applications and/or mechanisms for performing one or more operations as outlined in the present disclosure, including amanagement application123 that can communicate directly or indirectly with a user device, e.g.mobile device110, and provide instructions in relation to and mechanisms enabling the decryption of anencryption mechanism125 related to one or more message segments contained in physical delivery, e.g.postal mail142, transmitted by acourier141 to auser102. In various embodiments, themanagement application123 can generate and/or be configured to retrieve theencryption mechanism125 and can instruct any suitable printing or device (not shown) to physically attach a suitable mechanism, e.g. barcode, that embodies the encryption and/or provides a vehicle to obtain discern the encryption, and by extension, subsequently decrypt it, on physical material contained in the physical delivery ofpostal mail142. In various embodiments, any suitable dynamic encryption can be used to continuously update the encryption embodied in the contents (or surface, e.g. on the outside of package) of thepostal mail142. In various embodiments, theencryption mechanism125 can include one or more ciphered texts in addition to, or in lieu of, the one ormore barcodes144, and thedecryption mechanism127 can include a suitable deciphering mechanism (e.g. a key associated with the cipher associated with the ciphered text) for deciphering the ciphered text.
Accordingly, in various embodiments, theencryption mechanism125 is facilitated by themanagement application123. For example, theencryption mechanism125 can be anysuitable barcode encryption144 affixed to a physical delivery, package, item, product, or mail (e.g. postal mail)142 delivered by acourier141, where, in various embodiments, thebarcode encryption144 can be affixed to contents inside thepostal mail142 and/or theencryption mechanism125 can be any suitable ciphered text, in addition to or in lieu of a barcode encryption, e.g. a portion of the sender message can be encrypted by ciphered text and a portion by barcode and/or within the barcode there can be additional material encrypted by ciphered text or the entirety of the message (and associated message segments) can be encrypted by ciphered text. In various embodiments, a decryption mechanism127 (e.g. a decryption token associated with a generated or to-be-generated barcode or barcodes and/or a key to decipher cipher text) associated with auser102 and theencryption mechanism125 can be continuously transmitted to a user device, e.g.mobile device110, prior to any physical delivery being scheduled or thedecryption mechanism127 can be transmitted only after an action is taken by auser102 with themobile device110, e.g. scanning one ormore barcodes144 to receive a decryption token in order to decrypt the one or more barcodes and obtain (in discernible form) message contents associated therewith.
In various embodiments, themanagement application123 can identify auser102 as a recipient for one or more message contents by reviewing dynamically updatedaccount data124 associated with goods or services provided by the entity associated with the host device, e.g. a service provider associated withserver120. For example, when a purchase or inquiry for a purchase is made with respect to a service or product, themanagement application123 can identify the user making the request for the purchase, instruct a transmission (and printing) of encrypted message contents in the form ofpostal mail142 to be transmitted to auser102 by anysuitable courier141. The message contents can be any suitable message contents, e.g. terms of service, and can be visible (e.g. viadisplay140 of the mobile device110) or otherwise communicable to theuser102 via the decryption of theencryption mechanism125 as embodied (e.g. as one or more barcodes144) in the contents ofpostal mail142. In various embodiments, since thepostal mail142 can have only the encryption mechanism and other minimal information thereon (e.g. the name and address of the user102), if themail142 is lost or misappropriated, the contents cannot be read or discerned by a third party.
In various embodiments, theserver120 can include a confirmation mechanism orapplication129, e.g. such as a confirmation log, which receives a confirmation from themobile device110 once the user has decrypted and/or reviewed one or more message contents associated with the decryption and decryption. In various embodiments, this enhances security by enabling the host to confirm that theuser102 has received the physical delivery (e.g., postal mail142). In various embodiments, this can also serve as a mechanism for permitting themanagement application123 to sequentially permit theuser102 to review various message segments and/or to require theuser102 to review one or more message segments prior to receiving any other message segments, e.g. critical portions of a terms of service.
In various embodiments, a single encryption mechanism is utilized for the entirety of the sender message and/or decryption a single message portion results in access to the entire message of the physical delivery (postal mail142), e.g. the management application can utilize a single encryption mechanism such a single barcode or ciphered text for the entire message and/or can utilize multiple encryption mechanisms, but require that only one message segment be decrypted for the entirety of the message to be obtainable and discernible by theuser102. In various embodiments, this results in theauthentication application114 merely facilitating a single scan with thebarcode application117 andscanner118 to obtain the entire message from the sender. In various embodiments, the entirety of the message can be reviewed after a certain number of message segments have been decrypted and/or when one or more of the critical message segments (e.g. critical portions of the terms of service) have been decrypted.
As shown,postal mail142 can be a container with postage, where themanagement application123 of the server can facilitate communication with a courier service, e.g. postal service, to receive the package, place postage thereon, and have acourier141 facilitate deliver to the user102 (e.g. recipient). The container can include any physical medium that can contain information in written, textual, and/or pictorial form, e.g. paper or any other suitable material for carrying such a message. The physical medium can embody one or more message segments from a sender associated with the host device,e.g. server120, forming an entirety of the message segment. In various embodiments,management application123 can determine that at least a portion of the message segment should be unencrypted and visible to the naked eye or ear, e.g. the name of the recipient, the address associated with the recipient, and/or the name of the sender (and/or the goods or services associated therewith). In various embodiments, themanagement application123, depending on the security requirements of the particular message, can decide the scope and nature of the unencrypted information, e.g. in certain instances, the name of the recipient can be removed and only the destination address can be unencrypted, etc. In various embodiments, as discussed above, the message can include two or more encrypted portions of a plurality of terms of service, where each of the two or more encrypted portions of the plurality of terms of service are associated with a distinct barcode144 (e.g. at least two barcodes, with each message segment associated with a distinct barcode of the at least two barcodes144) corresponding to each of the two or more encrypted portions. In various embodiments, the encryption is based at least in part on an identity information of a recipient, e.g. themanagement application123 can determine the strength, nature and scope of theencryption mechanism125 based on the information associated with the recipient account (e.g. the sensitivity of the service and/or identity of the recipient). The identity information may be an encrypted customer ID109 generated by themobile device110 and received by themanagement application123 from themobile device110. In various embodiments, the one ormore barcodes144 can be configured for scanning by a device associated with the recipient, e.g.mobile device110 and by theauthentication application114,barcode application117, andscanner118, and where each barcode is associated with a token configured for decrypting the two or more encrypted portions (e.g. as transmitted and determined by the management application123).
Embodiments are not limited in the above manner, and the above system is merely an exemplary embodiment for implementing one or more features of the present disclosure.
FIG. 2 illustrates an example of alogic flow200 that may be representative of some or all of the operations executed by one or more embodiments described herein. For example, thelogic flow200 may illustrate operations performed by an encryption, decryption and/or delivery system and/or components described herein, or as otherwise may be suitable, to deliver, encrypt, and/or decrypt a physical delivery, e.g. postal mail, with one or more message segments associated with encryption contained therein.
Atblock205, one or more embodiments of thelogic flow200 may include at least one component as described in the present disclosure identifying a recipient for transmission of a message from a sender. In various embodiments, a suitable component as described herein can perform the identification by reviewing or continuously polling a database that is updated dynamically for order, inquiries, or changes associated with account information related to the recipient and goods or services provided by the sender.
Atblock210, one or more embodiments of thelogic flow200 may include at least one component as described in the present disclosure encrypting, utilizing at least one device associated with the sender, two or more portions of a sender message, each of the two or more portions of the sender message corresponding to a distinct scannable encryption mechanism located on a physical medium, where the physical medium contains an unencrypted message portion, and where the encryption is based at least in part on an identity information of a recipient. For example, in various embodiments, an application of a server device can determine the level of encryption required based on identity information associated with the recipient, e.g. by polling account data, the nature of the service to be provided to the recipient and/or the identity of the individual recipient himself, herself, or itself can determine the type and nature of the encryption. In various embodiments, the encryption mechanism can include one or both of ciphered text and/or one or more barcodes to represent one or more of the encrypted message portion. In various embodiments, the unencrypted information can be readily discernible information that includes at least one of the identity of the recipient, the address of the recipient and/or the sender identity, address, and/or goods or services associated therewith. In various embodiments, the encrypted message segments are embodied in a physical medium contained in postal mail to be delivered the recipient, where one or more applications of a server determine the courier to deliver the physical mailing, in addition to the printing of the embodiment of the encryption mechanism with respect to the encrypted message segments of the postal mail contents. In various embodiments, each of the encrypted message segments correspond to one or more portions of a plurality of terms of service associated with the goods or services provided by the sender (e.g. associated with the server).
In various embodiments, one or more applications of the sender device, e.g. server, and/or one or more application associated with the recipient device, e.g. mobile phone of a user, can determine when one or more of the plurality of terms are associated with a critical term of the terms of service, such as a monetary term associated with goods or services offered by the sender and/or a limitation of liability in association with goods or services offered by the sender, and perform or require a performance of an additional operation as a result, e.g. requiring that those one or more terms are reviewed by the recipient (and a confirmation of the same as outlined in the rest of theflow200 or as otherwise suitable) is transmitted to the sender (e.g. server) as a result of the nature of those critical terms of the terms of service. In various embodiments, a distinct encryption mechanism is associated with each segment corresponding to at least two of the sensitive (or other) message segments, e.g. a first barcode and/or ciphered text associated with a first of the plurality of terms of service (e.g. a first sensitive term, e.g. such as the monetary term) and a second barcode and/or ciphered text associated with a second of the plurality of terms of service (e.g. second sensitive term, e.g. such as the limitation of liability term).
Atblock215, one or more embodiments of thelogic flow200 may include at least one component, as described in the present disclosure, transmitting at least one decryption mechanism to a device associated with the recipient, where the decryption mechanism is based at least in part on the identity information of the recipient, and where the decryption mechanism is configured to decrypt the two or more encrypted portions of the sender message. For example, in various embodiments, the server device can continuously transmit a decryption token and/or key (static or alternating) associated with ciphered text to a mobile device of the user, where the decryption mechanism is based on the level and type of encryption used to encrypt the message segment (e.g. which can be dependent on the identity of the user and/or sensitivity of the information to be transmitted as described herein). In various embodiments, the encryption type can be one or more encryption tokens encoded and/or associated with one or more barcodes and/or one or more ciphered texts associated with any suitable cryptographic technique. The decryption mechanism can change if multiple physical mediums (e.g. different mail deliveries with different messages) are transmitted to the recipient and/or if the encryption mechanism is dynamic and alterable by an application associated with the server as the message is transmitted.
Atblock220, one or more embodiments of thelogic flow200 may include at least one component as described in the present disclosure transmitting the physical medium to the recipient, e.g. utilizing account data or other data, one or more components and/or devices associated with the sender can determine an appropriate courier service to deliver the physical mail to the recipient and/or engage a service or device to do the actual printing of the encryption mechanism with respect to the message contents contained in the mail, and where in various embodiments, the courier service actually facilitates the delivery of the postal mail (which includes the encrypted message segments) to the recipient.
Atblock225, one or more embodiments of thelogic flow200 may include at least one component as described in the present disclosure scanning, using the device associated with the recipient, each of the scannable encryption mechanisms, and atblock230, one or more embodiments of thelogic flow200 may include at least one component as described in the present disclosure decrypting, based on the scanning and using the at least one decryption mechanism at the device associated with the recipient, each (or at least one) of the two or more portions of the sender message. For example, in various embodiments, a mobile device of the user may have a scanner and/or barcode application to scan the barcode and/or ciphered text, and to engage one or more other applications to utilize the transmitted decryption mechanism to decrypt (e.g. perform a decryption operation on) one or more of the encrypted message segments. In various embodiments, two or more encrypted message segments can be decrypted using either one or both of the decryption mechanism associated with a barcode or ciphered text, and performing a decryption operation in relation thereto, to obtain decrypted message segments (and display the same to the user).
In various embodiments, one or more of the decrypted message segments can be displayed on the display of the user device once decrypted (e.g. for review and/or discernment of the user). In various embodiments, a single decryption of a single message segments can result in the entirety of the message segment being unencrypted and available to the user. In various embodiments, each message segment can be required to be decrypted separately. In various embodiments, in order for the entirety of the message of the sender to be displayed or accessible by the user via the mobile device, one or more of the critical message portions (e.g. critical portions of a terms of service) must be decrypted by the user before accessing additional message segments. In various embodiments, once one or more critical terms are decrypted and/or confirmed as accepted by the user, the entirety of the rest of the message of the sender is accessible and displayable to the user.
Atblock235, one or more embodiments of thelogic flow200 may include at least one component as described in the present disclosure sending a first confirmation message to the at least one device associated with the sender once a decryption of one of the two or more portions of the sender message is complete. In various embodiments, the confirmation can be sent from the mobile device to the server at any time after the message portion has been decrypted. In various embodiments, an affirmative act on the mobile device can be required of the user to confirm that he or she has reviewed the message segment. In various embodiments, review of the first message segment can be required before other message segments are decryptable, e.g. when dealing with a sensitive term of a terms of service, that terms may have to be reviewed and confirmed reviewed first before proceeding to additional terms, even if the decryption mechanism or mechanisms otherwise permit decryption of subsequent message segments.
Atblock240, one or more embodiments of thelogic flow200 may include at least one component as described in the present disclosure sending a second confirmation message to the at least one device associated with the sender once a decryption of another one of the two or more portions of the sender message is complete. In various embodiments, the confirmation can be sent from the mobile device to the server at any time after the second message portion has been decrypted. In various embodiments, an affirmative act on the mobile device can be required of the user to confirm that he or she has reviewed the second message segment. In various embodiments, review of the second message segment can be required before other message segments are decryptable, e.g. when dealing with a (second) sensitive term of a terms of service, that terms may have to be reviewed and confirmed reviewed first before proceeding to additional terms, even if the decryption mechanism or mechanisms otherwise permit decryption of subsequent message segments.
FIG. 3 illustrates an example of alogic flow300 that may be representative of some or all of the operations executed by one or more embodiments described herein. For example, thelogic flow300 may illustrate operations performed by an encryption, decryption and/or delivery system and/or components described herein, or as otherwise may be suitable, to deliver, encrypt, and/or decrypt a physical delivery, e.g. postal mail, with one or more message segments associated with encryption contained therein.
In various embodiments, thelogic flow300 can begin atblock240 oflogic flow200 and/or include at least one operation with respect tologic flow200 before commencing any additional operations. Atblock310, one or more embodiments of thelogic flow300 may include at least one component as described in the present disclosure determining that one or more message segments are part of a plurality of terms of service and/or that the plurality of portions of the plurality of terms of services that are associated with at least one of i) a monetary term and ii) a liability term. For example, an application associated with a mobile device of a user (e.g. recipient) may communicate with an application of a server associated with a sender, and upon successfully initiating a decryption operation, the server application can communicate that at critical term of a terms of service is associated with the overall message segment, e.g. a monetary term and/or a liability term.
Atblock315, one or more embodiments of thelogic flow300 may include at least one component as described in the present disclosure displaying, at the device associated with the recipient, a first message to the recipient requesting that the recipient accept the first one of the plurality of portions of the plurality of the terms of service. For example, the first critical term of the terms of service can be presented to the user for acceptance via the display of the mobile device, and subsequent decryption or access of additional message segments can be contingent on the user affirmatively accepting that first critical term of service on the display.
Atblock320, one or more embodiments of thelogic flow300 may include at least one component as described in the present disclosure, upon receiving confirmation of the acceptance of the first one of the plurality of portions of the plurality of the terms of service, transmitting the first confirmation and/or identifying a second one of the plurality of portions of the plurality of terms of service, e.g. once the user performs the affirmative act on the display, an application of the mobile device communicates the same to the server, and the server can indicate that a second portion of the terms of service is critical and must be accepted, e.g. the other of the limitation of liability and/or monetary term.
Atblock325, one or more embodiments of thelogic flow300 may include at least one component as described in the present disclosure displaying, at the device associated with the recipient, a second message to the recipient requesting that the recipient accept the second one of the plurality of portions of the plurality of the terms of service. For example, the second critical term of the terms of service can be presented to the user for acceptance via the display of the mobile device, and subsequent decryption or access of additional message segments can be contingent on the user affirmatively accepting that second critical term of service on the display
Atblock330, one or more embodiments of thelogic flow300 may include at least one component as described in the present disclosure displaying any remaining portions of the plurality of the terms of service only when the first confirmation and the second confirmation are received by the service, e.g. once the server receives confirmation that that critical terms of the terms of service have been accepted by the user, one or more applications of the mobile device can decrypt the remaining message segments and/or access the entirety of the remaining message segments automatically once the decryption occurs.
FIG. 4 illustrates an example of an encoding, decoding and/or message transmission system406. The encoding, decoding and/or message transmission system406 includes one or more processor(s)432,memory434,storage436, one or more interface(s)438, and one or more I/O device(s)440.
In embodiments, the encoding, decoding and/or message transmission system406 may be a processing system that includes one or more servers or computing devices that are interconnected via one or more network links, e.g., wired, wireless, fiber, etc. In some instances, the system406 may be a distributed computing system. Each of the servers may include one or more processor(s)432, which may include one or more processing cores to process information and data. Moreover, the one ormore processors432 can include one or more processing devices, such as a microprocessor manufactured by Intel™, AMD™, or any of various processors. The disclosed embodiments are not limited to any type of processor(s).
Memory434 can include one or more memory (volatile or non-volatile) devices configured to store instructions used by the one ormore processors432 to perform one or more operations consistent with the disclosed embodiments. For example,memory434 can be configured with one or more software instructions, such as programs that can perform one or more operations when executed by the one ormore processors432.
The disclosed embodiments are not limited to separate programs or computers configured to perform dedicated tasks. For example,memory434 can include a single program that performs the operations or could comprise multiple programs.Memory434 can also store data that can reflect any type of information in any format that the system can use to perform operations consistent with the disclosed embodiments.
In embodiments, the system406 may include one ormore storage devices436. Thestorage devices436 may include HDDs, flash memory devices, optical storage devices, floppy storage devices, etc. In some instances, thestorage devices436 may include cloud-based storage devices that may be accessed via a network interface. In some embodiments, thestorage436 may be configured to store one or more databases and/or as a distributed database system to store information and data. Databases can include one or more memory devices that store information and are accessed and/or managed through the system406. By way of example, databases can include Oracle™ databases, Sybase™ databases, or other relational databases or non-relational databases, such as Hadoop sequence files, HBase, or Cassandra. The databases or other files can include, for example, data and information related to the source and destination of a network request, the data contained in the request, transaction information, etc. Systems and methods of disclosed embodiments, however, are not limited to separate databases. In one aspect, system406 can include databases located remotely from other system406 devices. The databases can include computing components (e.g., database management system, database server, etc.) configured to receive and process requests for data stored in memory devices of databases and to provide data from databases.
FIG. 5 illustrates an embodiment of anexemplary computing architecture500 suitable for implementing one or more embodiments as previously described. In one embodiment, thecomputing architecture500 may include or be implemented as part ofsystem100.
As used in this application, the terms “system” and “component” are intended to refer to a computer-related entity, either hardware, a combination of hardware and software, software, or software in execution, examples of which are provided by theexemplary computing architecture500. For example, a component can be, but is not limited to being, a process running on a processor, a processor, a hard disk drive, multiple storage drives (of optical and/or magnetic storage medium), an object, an executable, a thread of execution, a program, and/or a computer. By way of illustration, both an application running on a server and the server can be a component. One or more components can reside within a process and/or thread of execution, and a component can be localized on one computer and/or distributed between two or more computers. Further, components may be communicatively coupled to each other by various types of communications media to coordinate operations. The coordination may involve the uni-directional or bi-directional exchange of information. For instance, the components may communicate information in the form of signals communicated over the communications media. The information can be implemented as signals allocated to various signal lines. In such allocations, each message is a signal. Further embodiments, however, may alternatively employ data messages. Such data messages may be sent across various connections. Exemplary connections include parallel interfaces, serial interfaces, and bus interfaces.
Thecomputing architecture500 includes various common computing elements, such as one or more processors, multi-core processors, co-processors, memory units, chipsets, controllers, peripherals, interfaces, oscillators, timing devices, video cards, audio cards, multimedia input/output (I/O) components, power supplies, and so forth. The embodiments, however, are not limited to implementation by thecomputing architecture500.
As shown inFIG. 5, thecomputing architecture500 includes aprocessing unit504, asystem memory506 and asystem bus508. Theprocessing unit504 can be any of various commercially available processors.
Thesystem bus508 provides an interface for system components including, but not limited to, thesystem memory506 to theprocessing unit504. Thesystem bus508 can be any of several types of bus structure that may further interconnect to a memory bus (with or without a memory controller), a peripheral bus, and a local bus using any of a variety of commercially available bus architectures. Interface adapters may connect to thesystem bus508 via a slot architecture. Example slot architectures may include without limitation Accelerated Graphics Port (AGP), Card Bus, (Extended) Industry Standard Architecture ((E)ISA), Micro Channel Architecture (MCA), NuBus, Peripheral Component Interconnect (Extended) (PCI(X)), PCI Express, Personal Computer Memory Card International Association (PCMCIA), and the like.
Thecomputing architecture500 may include or implement various articles of manufacture. An article of manufacture may include a computer-readable storage medium to store logic. Examples of a computer-readable storage medium may include any tangible media capable of storing electronic data, including volatile memory or non-volatile memory, removable or non-removable memory, erasable or non-erasable memory, writeable or re-writeable memory, and so forth. Examples of logic may include executable computer program instructions implemented using any suitable type of code, such as source code, compiled code, interpreted code, executable code, static code, dynamic code, object-oriented code, visual code, and the like. Embodiments may also be at least partly implemented as instructions contained in or on a non-transitory computer-readable medium, which may be read and executed by one or more processors to enable performance of the operations described herein.
Thesystem memory506 may include various types of computer-readable storage media in the form of one or more higher speed memory units, such as read-only memory (ROM), random-access memory (RAM), dynamic RAM (DRAM), Double-Data-Rate DRAM (DDRAM), synchronous DRAM (SDRAM), static RAM (SRAM), programmable ROM (PROM), erasable programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), flash memory, polymer memory such as ferroelectric polymer memory, ovonic memory, phase change or ferroelectric memory, silicon-oxide-nitride-oxide-silicon (SONOS) memory, magnetic or optical cards, an array of devices such as Redundant Array of Independent Disks (RAID) drives, solid state memory devices (e.g., USB memory, solid state drives (SSD) and any other type of storage media suitable for storing information. In the illustrated embodiment shown inFIG. 5, thesystem memory506 can includenon-volatile memory510 and/orvolatile memory512. A basic input/output system (BIOS) can be stored in thenon-volatile memory510.
Thecomputer502 may include various types of computer-readable storage media in the form of one or more lower speed memory units, including an internal (or external) hard disk drive (HDD)514, a magnetic floppy disk drive (FDD)516 to read from or write to a removable magnetic disk518, and anoptical disk drive520 to read from or write to a removable optical disk522 (e.g., a CD-ROM or DVD). TheHDD514,FDD516 andoptical disk drive520 can be connected to thesystem bus508 by anHDD interface524, anFDD interface526 and anoptical drive interface528, respectively. TheHDD interface524 for external drive implementations can include at least one or both of Universal Serial Bus (USB) and IEEE 1394 interface technologies.
The drives and associated computer-readable media provide volatile and/or nonvolatile storage of data, data structures, computer-executable instructions, and so forth. For example, a number of program modules can be stored in the drives andmemory units510,512, including anoperating system530, one ormore application programs532,other program modules534, andprogram data536. In one embodiment, the one ormore application programs532,other program modules534, andprogram data536 can include, for example, the various applications and/or components of thesystem500.
A user can enter commands and information into thecomputer502 through one or more wire/wireless input devices, for example, akeyboard538 and a pointing device, such as amouse540. Other input devices may include microphones, infra-red (IR) remote controls, radio-frequency (RF) remote controls, gamepads, stylus pens, card readers, dongles, finger print readers, gloves, graphics tablets, joysticks, keyboards, retina readers, touch screens (e.g., capacitive, resistive, etc.), trackballs, trackpads, sensors, styluses, and the like. These and other input devices are often connected to theprocessing unit504 through aninput device interface542 that is coupled to thesystem bus508 but can be connected by other interfaces such as a parallel port, IEEE 1394 serial port, a game port, a USB port, an IR interface, and so forth.
Amonitor544 or other type of display device is also connected to thesystem bus508 via an interface, such as avideo adaptor546. Themonitor544 may be internal or external to thecomputer502. In addition to themonitor544, a computer typically includes other peripheral output devices, such as speakers, printers, and so forth.
Thecomputer502 may operate in a networked environment using logical connections via wire and/or wireless communications to one or more remote computers, such as aremote computer548. Theremote computer548 can be a workstation, a server computer, a router, a personal computer, portable computer, microprocessor-based entertainment appliance, a peer device or other common network node, and typically includes many or all the elements described relative to thecomputer502, although, for purposes of brevity, only a memory/storage device550 is illustrated. The logical connections depicted include wire/wireless connectivity to a local area network (LAN)552 and/or larger networks, for example, a wide area network (WAN)554. Such LAN and WAN networking environments are commonplace in offices and companies, and facilitate enterprise-wide computer networks, such as intranets, all of which may connect to a global communications network, for example, the Internet.
When used in a LAN networking environment, thecomputer502 is connected to theLAN552 through a wire and/or wireless communication network interface oradaptor556. Theadaptor556 can facilitate wire and/or wireless communications to theLAN552, which may also include a wireless access point disposed thereon for communicating with the wireless functionality of theadaptor556.
When used in a WAN networking environment, thecomputer502 can include amodem558, or is connected to a communications server on theWAN554 or has other means for establishing communications over theWAN554, such as by way of the Internet. Themodem558, which can be internal or external and a wire and/or wireless device, connects to thesystem bus508 via theinput device interface542. In a networked environment, program modules depicted relative to thecomputer502, or portions thereof, can be stored in the remote memory/storage device550. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers can be used.
Thecomputer502 is operable to communicate with wire and wireless devices or entities using the IEEE 802 family of standards, such as wireless devices operatively disposed in wireless communication (e.g., IEEE 802.11 over-the-air modulation techniques). This includes at least Wi-Fi (or Wireless Fidelity), WiMax, and Bluetooth™ wireless technologies, among others. Thus, the communication can be a predefined structure as with a conventional network or simply an ad hoc communication between at least two devices. Wi-Fi networks use radio technologies called IEEE 802.118 (a, b, g, n, etc.) to provide secure, reliable, fast wireless connectivity. A Wi-Fi network can be used to connect computers to each other, to the Internet, and to wire networks (which use IEEE 802.3-related media and functions).
The various elements of the devices as previously described with reference toFIGS. 1-5 may include various hardware elements, software elements, or a combination of both. Examples of hardware elements may include devices, logic devices, components, processors, microprocessors, circuits, processors, circuit elements (e.g., transistors, resistors, capacitors, inductors, and so forth), integrated circuits, application specific integrated circuits (ASIC), programmable logic devices (PLD), digital signal processors (DSP), field programmable gate array (FPGA), memory units, logic gates, registers, semiconductor device, chips, microchips, chip sets, and so forth. Examples of software elements may include software components, programs, applications, computer programs, application programs, system programs, software development programs, machine programs, operating system software, middleware, firmware, software modules, routines, subroutines, functions, methods, procedures, software interfaces, application program interfaces (API), instruction sets, computing code, computer code, code segments, computer code segments, words, values, symbols, or any combination thereof. However, determining whether an embodiment is implemented using hardware elements and/or software elements may vary in accordance with any number of factors, such as desired computational rate, power levels, heat tolerances, processing cycle budget, input data rates, output data rates, memory resources, data bus speeds and other design or performance constraints, as desired for a given implementation.
FIG. 6 is a block diagram depicting anexemplary communications architecture600 suitable for implementing one or more embodiments as previously described. Thecommunications architecture600 includes various common communications elements, such as a transmitter, receiver, transceiver, radio, network interface, baseband processor, antenna, amplifiers, filters, power supplies, and so forth. The embodiments, however, are not limited to implementation by thecommunications architecture600, which may be consistent withsystem100.
As shown inFIG. 6, thecommunications architecture600 includes one ormore clients602 andservers604. Theservers604 may implement the server device and/or system406. Theclients602 and theservers604 are operatively connected to one or more respectiveclient data stores606 andserver data stores607 that can be employed to store information local to therespective clients602 andservers604, such as cookies and/or associated contextual information.
Theclients602 and theservers604 may communicate information between each other using acommunication framework610. Thecommunications framework610 may implement any well-known communications techniques and protocols. Thecommunications framework610 may be implemented as a packet-switched network (e.g., public networks such as the Internet, private networks such as an enterprise intranet, and so forth), a circuit-switched network (e.g., the public switched telephone network), or a combination of a packet-switched network and a circuit-switched network (with suitable gateways and translators).
Thecommunications framework610 may implement various network interfaces arranged to accept, communicate, and connect to a communications network. A network interface may be regarded as a specialized form of an input/output (I/O) interface. Network interfaces may employ connection protocols including without limitation direct connect, Ethernet (e.g., thick, thin, twisted pair 10/100/1000 Base T, and the like), token ring, wireless network interfaces, cellular network interfaces, IEEE 702.7a-x network interfaces, IEEE 702.16 network interfaces, IEEE 702.20 network interfaces, and the like. Further, multiple network interfaces may be used to engage with various communications network types. For example, multiple network interfaces may be employed to allow for the communication over broadcast, multicast, and unicast networks. Should processing requirements dictate a greater amount speed and capacity, distributed network controller architectures may similarly be employed to pool, load balance, and otherwise increase the communicative bandwidth required byclients602 and theservers604. A communications network may be any one and the combination of wired and/or wireless networks including without limitation a direct interconnection, a secured custom connection, a private network (e.g., an enterprise intranet), a public network (e.g., the Internet), a Personal Area Network (PAN), a Local Area Network (LAN), a Metropolitan Area Network (MAN), an Operating Missions as Nodes on the Internet (OMNI), a Wide Area Network (WAN), a wireless network, a cellular network, and other communications networks.
The components and features of the devices described above may be implemented using any combination of discrete circuitry, application specific integrated circuits (ASICs), logic gates and/or single chip architectures. Further, the features of the devices may be implemented using microcontrollers, programmable logic arrays and/or microprocessors or any combination of the foregoing where suitably appropriate. It is noted that hardware, firmware and/or software elements may be collectively or individually referred to herein as “logic” or “circuit.”
It will be appreciated that the exemplary devices shown in the block diagrams described above may represent one functionally descriptive example of many potential implementations. Accordingly, division, omission or inclusion of block functions depicted in the accompanying figures does not infer that the hardware components, circuits, software and/or elements for implementing these functions would be necessarily be divided, omitted, or included in embodiments.
At least one computer-readable storage medium may include instructions that, when executed, cause a system to perform any of the computer-implemented methods described herein.
Some embodiments may be described using the expression “one embodiment” or “an embodiment” along with their derivatives. These terms mean that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment. Moreover, unless otherwise noted the features described above are recognized to be usable together in any combination. Thus, any features discussed separately may be employed in combination with each other unless it is noted that the features are incompatible with each other.
With general reference to notations and nomenclature used herein, the detailed descriptions herein may be presented in terms of program procedures executed on a computer or network of computers. These procedural descriptions and representations are used by those skilled in the art to most effectively convey the substance of their work to others skilled in the art.
A procedure is here, and generally, conceived to be a self-consistent sequence of operations leading to a desired result. These operations are those requiring physical manipulations of physical quantities. Usually, though not necessarily, these quantities take the form of electrical, magnetic or optical signals capable of being stored, transferred, combined, compared, and otherwise manipulated. It proves convenient at times, principally for reasons of common usage, to refer to these signals as bits, values, elements, symbols, characters, terms, numbers, or the like. It should be noted, however, that all of these and similar terms are to be associated with the appropriate physical quantities and are merely convenient labels applied to those quantities.
Further, the manipulations performed are often referred to in terms, such as adding or comparing, which are commonly associated with mental operations performed by a human operator. No such capability of a human operator is necessary, or desirable in most cases, in any of the operations described herein, which form part of one or more embodiments. Rather, the operations are machine operations.
Some embodiments may be described using the expression “coupled” and “connected” along with their derivatives. These terms are not necessarily intended as synonyms for each other. For example, some embodiments may be described using the terms “connected” and/or “coupled” to indicate that two or more elements are in direct physical or electrical contact with each other. The term “coupled,” however, may also mean that two or more elements are not in direct contact with each other, but yet still co-operate or interact with each other.
One or more embodiments also relate to apparatus or systems for performing these operations. This apparatus may be specially constructed for the required purpose and may be selectively activated or reconfigured by a computer program stored in the computer. The procedures presented herein are not inherently related to a particular computer or other apparatus. The required structure for a variety of these machines will appear from the description given.
It is emphasized that the Abstract of the Disclosure is provided to allow a reader to quickly ascertain the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments require more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed embodiment. Thus, the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separate embodiment. In the appended claims, the terms “including” and “in which” are used as the plain-English equivalents of the respective terms “comprising” and “wherein,” respectively. Moreover, the terms “first,” “second,” “third,” and so forth, are used merely as labels, and are not intended to impose numerical requirements on their objects.
What has been described above includes examples of the disclosed architecture. It is, of course, not possible to describe every conceivable combination of components and/or methodologies, but one of ordinary skill in the art may recognize that many further combinations and permutations are possible. Accordingly, the novel architecture is intended to embrace all such alterations, modifications and variations that fall within the spirit and scope of the appended claims.